Blog

Facebook Whistleblower Frances Haugen

Facebook Whistleblower Frances Haugen

by Vivian Nguyen | May 17, 2022 | Data & Cybersecurity

Who is Frances Haugen? Frances Haugen grew up attending the Iowa caucuses with her academic parents giving her a strong sense of pride in democracy and civic responsibility. Haugen holds a degree in Electrical and Computer Engineering from Olin College and an MBA from Harvard. She is a specialis ....

Cash App Breach

Cash App Breach: Why Least Privilege Access Matters

by Kristen Hicks | May 9, 2022 | Data & Cybersecurity

We know hackers are getting more sophisticated. Cyber attacks and data breaches make the news on a regular basis, and the costs involved are staggering. But as organizations work to shield themselves from the growing threat of outside hackers, failing to look for threats from within could be just as ....

Summit 2022 Day 2

2022 Third Party Risk Summit: Day 2 Recap

by Mark Rudio | May 6, 2022 | News And Events, Shared Assessments Summit

Lifetime Achievement Awards Catherine Allen (Founder and Chairperson of Shared Assessments) was honored to present these awards “to two extremely deserving recipients” at the 2022 Third Party Risk Summit. Ms. Allen noted Security Magazine called Dr. Larry Ponemon (Founder, Ponemon Institute) ....

DAY OF Summit Social Posts 1

2022 Third Party Risk Summit: Day 1 Recap

by Mark Rudio | May 4, 2022 | News And Events, Shared Assessments Summit

Catherine A. Allen, Founder, Chairman and former CEO of Shared Assessments, kicked off the 2022 Third Party Risk Summit with a warm welcome while noting “It’s really a strange time. It’s been a strange time ever since Covid started, and since our last in-person conference, which was in 2019. ....

Supply Chains of the Future

Future Supply Chains: More Diversity, Sharper Diligence

by Eric Krell | May 3, 2022 | Business Continuity, Supply Chain

Applying a dose of hindsight to the Conference Board’s C-Suite Outlook 2022 survey report seems to reveal major gaps. Surveying 1,614 C-suite executives (including 917 CEOs globally), the report reflects “C-Suite Outlook,” exploring external stress points faced by business leaders. What is th ....

The Great Resignation Managing Third Party Risk

The Great Resignation: Managing Third Party Risk

by Eric Krell | May 2, 2022 | Data & Cybersecurity

One year ago, a Texas A&M educator predicted a trend that now taxes nearly every third party risk management program, whether they know it or not. “The great resignation is coming,” Texas A&M Associate Professor of Management Anthony Klotz warned Bloomberg BusinessWeek last May. “When there’ ....

quantum ransomware

Quantum Ransomware - Quick Questions

by Mark Rudio | May 2, 2022 | Data & Cybersecurity

Another ransomware attack is garnering a lot of attention. Not because the perpetrators want an astonishing amount of crypto, or because they’re threatening to disrupt commerce across an entire country, but because the threat actors went from infecting the victim’s system to encrypting it in les ....

Twitter Acquisition Risk Management

Twitter Acquisition: Risk Management Weighs In

by Sabine Zimmer | April 26, 2022 | Third Party Risk Management

Freedom Of Tweet In case you have not heard the news….the world’s richest person and self-declared “free speech absolutist” has reached a deal to buy Twitter for approximately $44 Billion. Elon Musk To Acquire Twitter In a statement announcing the deal, Elon Musk declared that “Free ....

poker credential stuffing attack

Poker Credential Stuffing Attack

by Mark Rudio | April 25, 2022 | Cyber Crime, Cyberattacks, Data & Cybersecurity, Hacking

Automated brute force attacks, also known as automated threats, are growing increasingly sophisticated. The Open Web Application Security Project (OWASP) currently lists 21 different methods of automated threats used by cybercriminals to hack into user accounts, ranging from CAPTCHA Defeat, which us ....

Protecting Data Center Infrastructures

Protecting Data-Center Infrastructures

by Kristen Hicks | April 25, 2022 | Data & Cybersecurity, Data Protection

We tend to think of the internet as mostly existing in the ether or “cyberspace,” but the online systems we depend on are tied to physical structures. And the physical side of your technology brings its own set of risks. When considering risk and vulnerabilities, many companies think first of ....

« Previous PageNext Page »